William R. Cheswick, Steven M. Though rewritten almost completely, this second edition retains much of the flavour and focus of the first, which is both a strength and a weakness. It is idiosyncratic and somewhat scattered, trying to cover everything while still providing unique material.
|Published (Last):||24 February 2013|
|PDF File Size:||16.37 Mb|
|ePub File Size:||5.87 Mb|
|Price:||Free* [*Free Regsitration Required]|
Yet another worthwhile book for us all in the IT industry! Addison-Wesley in cooperation with William Cheskwick, Steven Bellovin and Aviel Rubin have produced yet another well-researched publication. In the first chapter, the authors express their view on network security and demonstrate the different methods an Administrator can use in order to secure their network s. This is carried out by categorizing security into Host-Based and Perimeter security. The chapters are concluded with a summary on wireless security.
The next five chapters chapter 4 to 8 inclusive , analyze various attacks used against networks and server operating systems in an attempt to exploit them. There is a wealth of information concerning hacking, allowing the reader to enter the mind of a hacker in terms of what they think and how they proceed to meet their goal.
Chapter 9 to 12 are dedicated to Firewalls and VPNs which, in passing, happen to be my favourite chapters. They offer an in-depth analysis of the Firewall concept, packet filtering, application-level filtering and circuit level gateways. This is perhaps the only downside to this informative book, where IPTables would have been beneficial to include, since people rarely use IPchains these days. Lastly, chapter 12 talks about VPNs, their encryption methods, and considers both their weaknesses and advantages.
In addition to this, the book continues with several more chapters covering general questions that may arise for the reader, such as intranet routing, administration security and intrusion detection systems. Towards the end, the authors talk about their personal experiences with people trying to hack into their companies and, as a result, explain the step- by- step process of how they managed to fight them and secure their networks.
These pages are simply a goldmine for anyone interested in this area.
Firewalls and Internet security : repelling the wily hacker
William R. Cheswick, Steven M. Bellovin + Aviel D. Rubin